QUESTION 1
1. When trying to achieve operational consistency, which
of following oversight phases performs the function of
periodically assessing to ensure desired results are
achieved?
impro
ve
meas
ure
review
mana
ge
2.50000
QUESTION 2 points
1. In order to be thoughtful about the implementation of
security policies and controls, leaders must balance the need
to reduce with
the impact to the business operations. Doing so could mean
phasing security controls in over time or be as simple as
aligning security implementation with the business’s training
events.
Costs
producti
v ity
Risk
data
storage
2.50000
QUESTION 3 points
1. The domain ensures risks are
diminished and remediated in the most cost-effective
manner. To prevent risk from increasing in severity and
scope, this domain coordinates risk responses ensuring
that the right people are engaged when appropriate.
risk
response
risk
governanc
e
risk
evaluati
on
risk
,Operational Security Midterm Exam Solved.
acceptanc
e
2.50000
QUESTION 4 points
, Operational Security Midterm Exam Solved.
1. If a CISO seeks to raise employees’ awareness of
the dangers of malware in the organization, which of
the following approaches is recommended?
The CISO should distribute a written explanation of the
dangers of malware to each employee.
The CISO should arrange for an IT expert on malware to give
a presentation to employees.
The CISO should explain the technical way in which
malware can infect a machine.
The CISO should talk about how malware could prevent the
service desk from helping a customer.
2.50000
QUESTION 5 points
1. Of the many factors one must consider to ensure
security policies and controls align with regulations; is/are
important to demonstrate coverage of regulatory
requirements because they show the importance of each
security control.
Evidence
Inventories
security control
mappings
business
requiremen
ts
2.50000
QUESTION 6 points
1. Using switches, routers, internal firewalls, and other
devices, you can restrict network traffic with a , which
limits what and how computers are able to talk to each other.
demilitariz
ed zone
flat
network
Sniffer
segment
ed
network
2.50000
QUESTION 7 points